Static task
static1
Behavioral task
behavioral1
Sample
088b4d6363dc57f2f1c2626a89e23d985ab71c1ae2305a176620343f2ba2455b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
088b4d6363dc57f2f1c2626a89e23d985ab71c1ae2305a176620343f2ba2455b.exe
Resource
win10v2004-20220901-en
General
-
Target
088b4d6363dc57f2f1c2626a89e23d985ab71c1ae2305a176620343f2ba2455b
-
Size
97KB
-
MD5
04b07517fcf9e40f8bcd9a3036e0e540
-
SHA1
fe8c7fd499aa6ac8dfa8d27b988b266f3bbe39df
-
SHA256
088b4d6363dc57f2f1c2626a89e23d985ab71c1ae2305a176620343f2ba2455b
-
SHA512
bee68f8252f46b5357587cd7631dd646ecde7aeab239132e25a661f82062674cd465100c39c755d3911718df175a135cb9f0c1d6424bdac42fe7c2c03d4ade82
-
SSDEEP
1536:3P6T+a6Qo/3sp+HDXNUzKUkZ90GYbsa8QfhRj3ZeV/8MVU7n:ra6QofLDdUzKx90GYbV8QZRpg/8
Malware Config
Signatures
Files
-
088b4d6363dc57f2f1c2626a89e23d985ab71c1ae2305a176620343f2ba2455b.exe windows x86
3f8feb41afdba25fbe42076e6c5002b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
GetEnvironmentVariableW
DeviceIoControl
EncodePointer
OutputDebugStringA
IsDebuggerPresent
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
DecodePointer
IsWow64Process
HeapDestroy
HeapSize
LocalFree
GetLastError
GetCommandLineW
Sleep
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetTempFileNameW
HeapReAlloc
GetFileSize
TlsGetValue
MapViewOfFile
UnmapViewOfFile
VirtualQuery
HeapAlloc
HeapFree
GetProcessHeap
GetWindowsDirectoryA
InitializeCriticalSection
TlsSetValue
FormatMessageW
LeaveCriticalSection
GetFileAttributesW
GetTempPathW
RaiseException
SetLastError
EnterCriticalSection
GetLocalTime
CreateFileMappingW
DeleteCriticalSection
TlsAlloc
GetWindowsDirectoryW
TlsFree
CloseHandle
CreateFileA
CreateMutexW
SetFilePointer
FreeLibrary
WaitForSingleObject
GetModuleHandleW
GetCurrentThread
ExpandEnvironmentStringsA
WriteFile
GetModuleFileNameW
CreateFileW
GetProcAddress
CreateFileMappingA
GetSystemInfo
GetModuleFileNameA
LoadLibraryExA
CreateMutexA
ReleaseMutex
GetVersion
DeleteFileW
DebugBreak
DeleteFileA
GetFileSizeEx
msvcrt
wcsrchr
_vsnwprintf
_vsnprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_purecall
_wcsnicmp
iswctype
feof
_wtoi
_wfopen
fgetws
_cexit
wcstok_s
fclose
towlower
free
malloc
__p__fmode
_ismbblead
__setusermatherr
_initterm
_acmdln
__CxxFrameHandler3
?terminate@@YAXXZ
_controlfp
_except_handler4_common
_lock
_unlock
__dllonexit
_onexit
swscanf_s
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
_wcsicmp
memset
memcpy
shell32
CommandLineToArgvW
ord165
advapi32
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
EqualSid
GetTokenInformation
OpenThreadToken
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetLengthSid
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
ole32
CoUninitialize
CoInitializeEx
propsys
PSRegisterPropertySchema
PSUnregisterPropertySchema
user32
UnregisterClassA
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dlxjkhw Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE